Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

risk and compliance

First launched in 2011, the Anti-Corruption Benchmarking Report aims to give compliance officers a comprehensive view of the "ABC" (anti-bribery and corruption) risks they have, the resources they have to fight them, and how those resources are implemented into compliance programs.
The results give compliance officers a view into the anti-bribery and corruption threats they face and share resources for creating a risk-based compliance program. Download the report to learn more.

Uncertain times and a volatile economic climate have contributed to an expanding focus on corporate governance, risk, and compliance (GRC) across all industries. As global mandates and compliance directives continue to snowball, organizations are faced with an imminent need to adopt a programmatic approach and tightly integrate risk management initiatives with ongoing business processes. Business intelligence and reporting also provide a powerful mechanism for gaining a deep understanding of key factors that impact corporate performance.

To achieve PCI DSS compliance, you must identify and remediate all critical vulnerabilities detected during PCI scans. Threat Manager streamlines this process by providing simple, actionable reports that detail vulnerabilities and recommendations. There is also a Dispute Wizard that helps document compensating controls that are in place to remediate specific vulnerabilities. PCI scans include the following reports: Executive Summary: Overview of scan results and a statement of compliance or non-compliance. Vulnerability Details: Provides a detailed description, list of impacted hosts,risk level and remediation tips for each vulnerability found. Attestation of Scan Compliance: Overall summary of network posture, compliance status and assertion that the scan complies with PCI requirements.

To achieve PCI DSS compliance, you must identify and remediate all critical vulnerabilities detected during PCI scans. Threat Manager streamlines this process by providing simple, actionable reports that detail vulnerabilities and recommendations. There is also a Dispute Wizard that helps document compensating controls that are in place to remediate specific vulnerabilities. PCI scans include the following reports: Executive Summary: Overview of scan results and a statement of compliance or non-compliance. Vulnerability Details: Provides a detailed description, list of impacted hosts, risk level and remediation tips for each vulnerability found. Attestation of Scan Compliance: Overall summary of network posture, compliance status and assertion that the scan complies with PCI requirements.

This paper explains SAP’s vision for a cross-enterprise governance, risk and compliance (GRC) solution and the benefits it can provide, defines key terms, and discusses what to look for when evaluating GRC software options.

Increased regulatory requirements, the need for transparency, and the desire to better manage and mitigate risks have combined to make Governance, Risk, and Compliance (GRC) top of mind for both business and Information Technology (IT) executives. Business managers and IT security managers must work collaboratively and continuously to control access and authorization, guarding against fraud and mistakes, while providing the clear visibility that is prerequisite for sound corporate oversight to ensure profitability and compliance.

Learn the reasons why a holistic view of risk in your company is essential in times of financial turbulence - and how many companies are adding value through governance, risk, and compliance (GRC) initiatives. (Economist Intelligence Unit, 2009)

Most organizations find managing risk and compliance a challenge - but the rewards for doing so well can be considerable. By putting the right processes, systems and controls in place, you can gain visibility into decisions taken all across the enterprise - and protect both corporate performance and reputation.

In today's heightened competitive and regulatory environment, an organization's fortunes can rise or fall based on the effectiveness of its financial systems, particularly those that drive its performance management. Organizations today are looking to optimize these systems, at the core of which are financial consolidation and planning.

Privileged access management can not only reduce your enterprise’s exposure to these risks but also improve IT reliability and reduce IT costs.
Download the white paper: Three Important Reasons for Privileged Access Management (and One Surprising Benefit). You’ll discover how a privilege access management solution can ensure:
• Comprehensive compliance such as the Sarbanes-Oxley Act for responsible governance.
• Ensure business integrity and responsible business processes.
• Tackle security risks, both inside and outside the organization.
• Realize bottom-line IT cost benefits.

This white paper describes how real organizations have handled these challenges and how a strong and reliable messaging solution like Quest Recovery Manager for Exchange could have mitigated risk, reduced cost, and improved regulatory compliance.

Drivers for cloud solutions include the need to innovate, simplify and cut costs. Users say a key benefit cloud-based security is no need to deploy equipment or software. The cloud provider furnishes and hosts everything in secure data centers. This arrangement lets your business avoid capital expenses and to control ongoing costs.
This paper describes how your small or medium-sized company can manage IT risks and maintain regulatory compliance with minimal staff and budget.

Sales tax compliance and the CFO: What automation means for risk management conveys why it’s time C-level executives should take a closer look at how sales tax is managed within their organizations. This report highlights what finance and accounting professionals know (and don’t know) about managing sales tax, and more importantly, why risk of non-compliance is more important in this legislative climate.
This report draws upon a recent study by Wakefield Research, which investigates what leading and emerging companies in the U.S. know about sales tax compliance — and, more importantly — what the accounting and finance professionals in the trenches are doing to safeguard their organizations from potential audits and accounting pitfalls.
Download this White Paper for more information.

Learn more about the security risks and vulnerabilities faced by organizations, and the elements of a proactive security approach. Then find out how Tripwire helps organizations attain and maintain a good security posture using industry-leading configuration assessment and change auditing to harden systems against security breaches, automate compliance with security standards and policies, identify configuration changes, and resolve vulnerabilities.

Identity governance is essential for oganizations to ensure the security of their IT systems and data as well as compliance with laws and regulations. Identity governance enables organizations manage IT related business risk and enable business compliance in consistent, efficient and effective manner. It adds value, reduces costs and improves security

Just as business intelligence helps enterprises make decisions that maximize opportunities and minimize business risks, security intelligence enables them to better detect threats, identify security risks and areas of noncompliance, and set priorities for remediation. One of the most compelling arguments for security intelligence is operational efficiency, or better use of people, time and infrastructure. This white paper discusses how security intelligence is an essential ingredient to comprehensive and cost-effective information security.

Modern enterprises are doing their best to address three simultaneous and closely interrelated objectives related to their information technology/infrastructure:
To identify and assess security-related risks, and manage them to an acceptable level
To achieve, sustain, and demonstrate compliance with policies and regulatory requirements
To improve the efficiency and cost-effectiveness of ongoing operations, e.g., to provide greater flexibility and scale at lower total annual cost
For several years now, Aberdeen Group has referred to this trifecta of strategic objectives as the quest for enterprise computing infrastructure to be secure, compliant, and well-managed.

Fraudsters are only becoming smarter. How is your organization keeping pace and staying ahead of fraud schemes and regulatory mandates to monitor for them? Technology is redefining what’s possible in fighting fraud and financial crimes, and SAS is at the forefront, offering solutions to:
• Protect from reputational, regulatory and financial risks.
• Reduce the cost of fraud and financial crimes prevention.
• Gain a holistic view of risk across functions.
• Include cyber events in regulatory report filings.
In this e-book, learn the basics in how to prevent fraud, achieve compliance and preserve security. SAS fraud solutions use advanced analytics and artificial intelligence to help your organization better detect and prevent fraud. By applying analytics and powerful machine learning on a unifying platform, SAS helps organizations around the globe detect more financial offenses, reduce false positives and run more efficient investigations.

"The Cincinnati Zoo & Botanical Garden is one of the nation’s most popular attractions, a Top 10 Zagat-rated Zoo, and a Top Zoo for Children according to Parent’s Magazine. Each year, more than 1.3 million people visit its 71-acre site, which is home to more than 500 animal and 3,000 plant species. Although the Zoo is a non-profit organization and is partially subsidized by Hamilton County, more than two thirds of its $26 million annual budgetis generated through its own fundraising
efforts."

Researched and compiled independently by Chartis, the RiskTech100® evaluates and ranks the world’s most influential risk technology providers based on a range of criteria. IBM retains its top position in the 2014 RiskTech® 100 rankings with top scores for functionality, market presence and innovation. The Chartis report is acknowledged globally as one of the most comprehensive and prestigious studies of risk technology vendors. The report also tracks key trends and developments in the risk technology marketplace. Read the report to learn how IBM can support your risk and compliance efforts to drive business performance and better outcomes.

According to Microsoft CEO Satya Nadella, Office 365 is Microsoft’s most strategic API. But to realize
the potential of this business collaboration platform, Microsoft and its partners have to convince
business and IT leaders that it offers levels of security, privacy, and compliance that are equal to or
higher than those of their existing on-premise solutions. Even though a high percentage of enterprises
are adopting cloud storage and compute within their businesses, the adoption of cloud-based content
and collaboration products is by no means universal. Concerns relating to governance, risk, and
compliance with regard to cloud services are understandable, but it is not unusual to find them
overstated.

Learn how much money your business can save.
In an objective study commissioned by Microsoft, Forrester Consulting investigated the Total Economic Impact™ for small to medium sized businesses, with 1 to 250 employees, using Office 365. The study revealed a sizeable return on investment.
One business founder had this to say, “The productivity gain is the main thing for me with Office 365. It’s allowed everybody to be more productive, and if there is any element of downtime on hardware, it’s just a case of moving into another location, whether it’d be the next desk, office, or Starbucks.”
Discover these findings and more when you download the free report:
• Improved Business Continuity. How enhanced business continuity lead to an avoidance in lost billable hours of $15,000 annually.
• Increased mobile worker productivity. How an investment in mobility saved45 hours per year per worker.
• Lowered Security, Risk, and Compliance Costs. How an organization went from 15 data breaches per year

Did you know that just like email, video conferencing is susceptible to security risks?
Our “Online Meetings: Secure Your Video Conferences” eBook shows you how small and medium businesses can use Skype for Business to provide effective collaboration tools—like HD video conferencing*—that are more secure and simple to use. In this ebook, you’ll discover how to:
Save on security, risk, and compliance costs
Reduce risk with a comprehensive solution
Simplify your IT environment and increase security
*For HD video, compatible HD hardware and broadband connection with at least 4 Mbps required.

This report looks at the challenges and requirements of protecting confidential patient data online, the risk of security breaches in the world of EHR, and the measures that healthcare organizations must take in order to achieve and maintain compliance.

Add Research

About us

DatacenterDynamics is a brand of DCD Group, a global B2B media and publishing company that develops products to help senior professionals in the world's most ICT dependent organizations make risk-based infrastructure and capacity decisions.

Our portfolio of live events, online and print publishing, business intelligence and professional development brands are centred on the complexities of technology convergence. Operating in 42 different countries, we have developed a unique global knowledge and networking platform, which is trusted by over 30,000 ICT, engineering and technology professionals.